CN111666470A - Big data business condition management system based on intelligent terminal - Google Patents
Big data business condition management system based on intelligent terminal Download PDFInfo
- Publication number
- CN111666470A CN111666470A CN202010428852.6A CN202010428852A CN111666470A CN 111666470 A CN111666470 A CN 111666470A CN 202010428852 A CN202010428852 A CN 202010428852A CN 111666470 A CN111666470 A CN 111666470A
- Authority
- CN
- China
- Prior art keywords
- module
- intelligent terminal
- data
- encryption algorithm
- business condition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/906—Clustering; Classification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Abstract
The invention discloses a big data business condition management system based on an intelligent terminal, which comprises a business condition data platform, a wireless communication module, a network crawler system, a block chain storage system, a cloud computing center and the intelligent terminal, wherein the business condition data platform carries out information interaction with the network crawler system through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module; and the block chain storage system stores the interactive information, and the cloud computing center calls data from the block chain storage system and then processes the data. The implementation of the invention has the following beneficial effects: the system has various data transmission modes and can meet the requirements of users on various data transmission modes.
Description
Technical Field
The invention relates to the field of big data management, in particular to a big data business condition management system based on an intelligent terminal.
Background
With the wide development of the internet, the data volume is increased, and the information is more transparent, networked, rapidly spread and wide in range. But also brings problems such as information islanding, information fragmentation, excessive irrelevant information, false information, errors and more contradictory information, so that users can hardly obtain real, accurate and detailed commercial information in the first time. The block chain big data business condition analysis platform provides first-hand, professional, detailed and accurate personalized business information for a user at the first time, and can be used in the fields of accurate marketing, investment risk control, industry economic development situation prediction, stock market prediction, enterprise credit assessment, scientific and technological project declaration, market business opportunity discovery, public opinion automatic monitoring and the like. However, the data transmission method is single, and the user's demand for diversified data transmission methods cannot be satisfied.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a big data business condition management system based on an intelligent terminal, which has multiple data transmission modes and can meet the requirements of users on diversified data transmission modes, aiming at the above defects of the prior art.
The technical scheme adopted by the invention for solving the technical problems is as follows: the big data business condition management system based on the intelligent terminal is constructed and comprises a business condition data platform, a wireless communication module, a web crawler system, a block chain storage system, a cloud computing center and the intelligent terminal, wherein the business condition data platform is in information interaction with the web crawler system through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
the block chain storage system stores the interactive information, the cloud computing center calls data from the block chain storage system and then processes the data, and a user operates the intelligent terminal to transmit the data processed in the cloud computing center to the intelligent terminal; the business situation data platform is used for classifying the collected target website library; the web crawler system is used for acquiring data of a target website library of all business situation data platforms through a web crawler and a customized web crawler; the block chain storage system is used for encrypting the information retrieved by the web crawler system by adopting a block chain centerless storage mode and then storing the encrypted information; the cloud computing center is used for classifying, sorting and storing the retrieved information through data preprocessing and data mining; the intelligent terminal is used for calling the information processed by the cloud computing center and displaying the processed business information on the intelligent terminal in real time.
In the big data business situation management system based on the intelligent terminal, the encryption algorithm is a DES encryption algorithm, an AES encryption algorithm, an RSA encryption algorithm, a Base64 encryption algorithm, an MD5 encryption algorithm, an SHA1 encryption algorithm, an HMAC encryption algorithm or an ECC encryption algorithm.
In the big data business condition management system based on the intelligent terminal, the web crawler system is composed of a plurality of web crawler block nodes and searches a target website library of the business condition data platform in real time.
In the big data business condition management system based on the intelligent terminal, the block chain storage system is composed of a plurality of area chain acquisition and storage block nodes and is used for storing data acquired by the plurality of network crawler block nodes.
In the big data business condition management system based on the intelligent terminal, the intelligent terminal is an intelligent mobile phone, a tablet personal computer, a notebook computer or a PDA.
In the big data business condition management system based on the intelligent terminal, the intelligent terminal calls corresponding business condition information from the block chain storage system according to the business condition information of the keywords set by the user and displays the business condition data.
The big data business condition management system based on the intelligent terminal has the following beneficial effects: the business condition data platform is in information interaction with the web crawler system through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and provides a plurality of wireless communication modes.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an embodiment of a big data business condition management system based on an intelligent terminal.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the embodiment of the intelligent terminal based big data business condition management system, the structural schematic diagram of the intelligent terminal based big data business condition management system is shown in fig. 1. In fig. 1, the intelligent terminal based big data business condition management system comprises a business condition data platform 1, a wireless communication module 2, a web crawler system 3, a block chain storage system 4, a cloud computing center 5 and an intelligent terminal 6, wherein the business condition data platform 1 performs information interaction with the web crawler system 3 through the wireless communication module 2; the wireless communication module 2 is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module. Through setting up multiple wireless communication mode, not only can increase wireless communication mode's flexibility, can also satisfy the demand of different users and different occasions. Especially, when adopting the loRa module, its communication distance is far away, and communication performance is comparatively stable, is applicable to the occasion that requires highly to communication quality. The adoption of the 5G communication mode can achieve high data rate, reduce delay, save energy, reduce cost, improve system capacity and realize large-scale equipment connection. The intelligent terminal-based big data business condition management system has multiple data transmission modes and can meet the requirements of users on the diversified data transmission modes.
The block chain storage system 4 stores the interactive information, and the block chain storage system 4 is composed of a plurality of regional chain acquisition storage block nodes and stores data acquired by the plurality of network crawler block nodes. The cloud computing center 5 calls the data from the block chain storage system 4 and then processes the data, and a user operates the intelligent terminal 6 to transmit the data processed in the cloud computing center 5 to the intelligent terminal 6; the business situation data platform 1 is used for classifying the collected target website library; the web crawler system 3 is used for collecting data of target website databases of all business situation data platforms through web crawlers and customized web crawlers. The web crawler system 3 is composed of a plurality of web crawler block nodes and is used for searching a target website library of the business situation data platform 1 in real time.
The block chain storage system 4 is used for storing the information retrieved by the web crawler system 3 after being encrypted by an encryption algorithm in a block chain centerless storage mode. The encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm or ECC encryption algorithm. By encrypting data, the security of data transmission is higher.
The DES encryption algorithm is a block cipher, data is encrypted by taking 64 bits as a block, the key length of the DES encryption algorithm is 56 bits, and the same algorithm is used for encryption and decryption. The DES encryption algorithm is to keep secret a key, while the public algorithm includes encryption and decryption algorithms. In this way, only a person who has mastered the same key as the sender can interpret the ciphertext data encrypted by the DES encryption algorithm. Thus, deciphering the DES encryption algorithm is actually the encoding of the search key. For a 56 bit long key, the number of operations is 256 if the search is done exhaustively. As the capabilities of computer systems continue to evolve, the security of the DES encryption algorithm is much weaker than it would have been if it had just appeared, yet it can still be considered sufficient from the practical standpoint of non-critical nature. However, the DES encryption algorithm is now only used for authentication of old systems, and new encryption standards are more selected.
The AES encryption algorithm is an advanced encryption standard in cryptography, adopts a symmetric block cipher system, the minimum support of the key length is 128, 192 and 256, the block length is 128 bits, and the algorithm is easy to realize by various hardware and software. This encryption algorithm is a block encryption standard adopted by the federal government in the united states, which is used to replace the original DES encryption algorithm, has been analyzed by many parties and is widely used throughout the world. The AES encryption algorithm is designed to support 128/192/256 bit (/32 ═ nb) data block sizes (i.e., packet lengths); the cipher length of 128/192/256 bits (/32 ═ nk) is supported, and in a 10-bit system, 34 × 1038, 62 × 1057 and 1.1 × 1077 keys are corresponded.
The RSA encryption algorithm is currently the most influential public key encryption algorithm and is generally considered to be one of the most elegant public key schemes at present. RSA is the first algorithm that can be used for both encryption and parity signing, which is resistant to all cryptographic attacks known so far, and has been recommended by ISO as the public key data encryption standard. The RSA encryption algorithm is based on a very simple number theory fact: it is easy to multiply two large prime numbers, but it is then desirable, but it is then extremely difficult to factorize their product, so the product can be made public as an encryption key.
The Base64 encryption algorithm is one of the most common encoding modes for transmitting 8-bit byte codes on a network, and the Base64 encoding can be used for transmitting longer identification information under the HTTP environment. For example, in the JAVAPERSISTENCE system HIBEMATE, Base64 was used to encode a longer unique identifier as a string used as a parameter in HTTP forms and HTTP GETTL. In other applications, it is also often necessary to encode the binary data into a form suitable for placement in a URL (including a hidden form field). In this case, the encoding by Base64 is not only relatively short, but also has the property of being unreadable, i.e., the encoded data cannot be directly seen by human eyes.
The MD5 encryption algorithm is a hash function widely used in the field of computer security to provide integrity protection for messages. A brief description of the MD5 encryption algorithm may be: MD5 processes incoming information in 512-bit packets, each of which is divided into 16 32-bit sub-packets, and after a series of processing, the output of the algorithm consists of four 32-bit packets, which are concatenated to produce a 128-bit hash value. The MD5 encryption algorithm is widely used for password authentication and key identification of various software. The MD5 encryption algorithm uses a hash function, and its typical application is to digest a piece of information to prevent tampering. A typical application of the MD5 encryption algorithm is to generate a finger print for a piece of Message to prevent "tampering". The use of the MD5 encryption algorithm also prevents "repudiation" by the author of the document if there is a third party certificate authority, a so-called digital signature application. The MD5 encryption algorithm is also widely used for login authentication of operating systems, such as UNIX, various BSD system login passwords, digital signatures, and so on.
The SHA1 encryption algorithm is a message digest algorithm that is as popular as the MD5 encryption algorithm. The SHA encryption algorithm mimics the MD4 encryption algorithm. The SHA encryption algorithm 1 is designed to be used with a Digital Signature Algorithm (DSA). The SHA1 encryption algorithm is mainly applicable to the digital signature algorithm defined in the digital signature standard. For messages less than 2 "64 bits in length, the SHA1 encryption algorithm would generate a 160-bit message digest. This message digest may be used to verify the integrity of the data when the message is received. During the transmission, the data is likely to change, and then different message digests are generated at this time. The SHA1 encryption algorithm may not recover information from a message digest, and two different messages may not produce the same message digest. Thus, the SHA1 encryption algorithm can verify the integrity of the data, so the SHA1 encryption algorithm is said to be a technique for ensuring the integrity of the file.
The SHA1 encryption algorithm may take no more than 264 bits of data input and produce a 160-bit digest. The input is divided into blocks of 512 bits and processed separately. A 160-bit buffer is used to hold the intermediate and final results of the hash function. The buffer may be represented by 5 32-bit registers (A, B, C, D and E). The SHA1 encryption algorithm is an algorithm with stronger security than the MD5 encryption algorithm, and theoretically, all digital authentication algorithms adopting a message digest mode have collision, namely, message digests calculated by two different things are the same, so that the intercommunication cheating graph is the same. However, the algorithm with high security is difficult to find the 'collision' of the specified data, and the 'collision' is more difficult to calculate by using the formula, so far, only the MD5 in the general security algorithm is broken.
The HMAC encryption algorithm is a key-dependent Hash-based message authentication Code (Hash-based message authentication Code), and the HMAC encryption algorithm uses a Hash algorithm (MD5, SHA1, etc.) and takes a key and a message as inputs to generate a message digest as an output. The keys of the sender and the receiver of the HMAC encryption algorithm are calculated, and a third party without the keys cannot calculate the correct hash value, so that data can be prevented from being tampered.
The ECC encryption algorithm is also an asymmetric encryption algorithm, the main advantage being that it provides a comparable or higher level of security in some cases using a smaller key than other methods, such as the RSA encryption algorithm. One disadvantage, however, is that the encryption and decryption operations are implemented longer than other mechanisms (which are more CPU-intensive than the RSA algorithm).
The cloud computing center 5 is used for classifying, sorting and storing the retrieved information through data preprocessing and data mining; the intelligent terminal 6 is used for calling the information processed by the cloud computing center and displaying the processed business situation information on the intelligent terminal 6 in real time. The intelligent terminal can be a smart phone, a tablet computer, a notebook computer or a PDA. The intelligent terminal 6 calls the corresponding business situation information from the block chain storage system 4 according to the business situation information of the keywords set by the user, and displays the business situation data.
In short, in this embodiment, the big data business condition management system based on the intelligent terminal can break the threat of illegally copying data and guarantee the legitimate rights and interests of a data owner. The block chain provides a traceable path, and the difficult problem of data right determination can be effectively solved. Due to the fact that the business condition data platform 1, the wireless communication module 2, the web crawler system 3, the block chain storage system 4, the cloud computing center 5 and the intelligent terminal 6 are arranged, the business condition data platform 1 and the web crawler system 3 carry out information interaction through the wireless communication module 2; the wireless communication module 2 is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module, and provides a plurality of wireless communication modes.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.
Claims (6)
1. A big data business condition management system based on an intelligent terminal is characterized by comprising a business condition data platform, a wireless communication module, a network crawler system, a block chain storage system, a cloud computing center and the intelligent terminal, wherein the business condition data platform is in information interaction with the network crawler system through the wireless communication module; the wireless communication module is any one or combination of any several of a 5G communication module, a 4G communication module, a Bluetooth module, a WiFi module, a GSM module, a CDMA2000 module, a WCDMA module, a TD-SCDMA module, a Zigbee module and a LoRa module;
the block chain storage system stores the interactive information, the cloud computing center calls data from the block chain storage system and then processes the data, and a user operates the intelligent terminal to transmit the data processed in the cloud computing center to the intelligent terminal; the business situation data platform is used for classifying the collected target website library; the web crawler system is used for acquiring data of a target website library of all business situation data platforms through a web crawler and a customized web crawler; the block chain storage system is used for encrypting the information retrieved by the web crawler system by adopting a block chain centerless storage mode and then storing the encrypted information; the cloud computing center is used for classifying, sorting and storing the retrieved information through data preprocessing and data mining; the intelligent terminal is used for calling the information processed by the cloud computing center and displaying the processed business information on the intelligent terminal in real time.
2. The big data business situation management system based on the intelligent terminal as claimed in claim 1, wherein the encryption algorithm is DES encryption algorithm, AES encryption algorithm, RSA encryption algorithm, Base64 encryption algorithm, MD5 encryption algorithm, SHA1 encryption algorithm, HMAC encryption algorithm or ECC encryption algorithm.
3. The intelligent terminal based big data business condition management system according to claim 2, wherein the web crawler system is composed of a plurality of web crawler block nodes, and searches a target website library of the business condition data platform in real time.
4. The intelligent terminal based big data business condition management system according to claim 3, wherein the block chain storage system is composed of a plurality of area chain collection and storage block nodes, and stores data collected by the plurality of network crawler block nodes.
5. The big data business condition management system based on the intelligent terminal according to any one of claims 1 to 4, wherein the intelligent terminal is a smart phone, a tablet computer, a notebook computer or a PDA.
6. The intelligent terminal-based big data business condition management system according to any one of claims 1 to 4, wherein the intelligent terminal invokes corresponding business condition information from the blockchain storage system according to business condition information of keywords set by a user, and displays the business condition data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010428852.6A CN111666470A (en) | 2020-05-20 | 2020-05-20 | Big data business condition management system based on intelligent terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010428852.6A CN111666470A (en) | 2020-05-20 | 2020-05-20 | Big data business condition management system based on intelligent terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111666470A true CN111666470A (en) | 2020-09-15 |
Family
ID=72384066
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010428852.6A Withdrawn CN111666470A (en) | 2020-05-20 | 2020-05-20 | Big data business condition management system based on intelligent terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111666470A (en) |
-
2020
- 2020-05-20 CN CN202010428852.6A patent/CN111666470A/en not_active Withdrawn
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chenaghlu et al. | A novel keyed parallel hashing scheme based on a new chaotic system | |
US20170308580A1 (en) | Data Aggregation/Analysis System and Method Therefor | |
Luo et al. | A novel covert communication method based on bitcoin transaction | |
CN113055376A (en) | Block chain data protection system | |
Vyakaranal et al. | Performance analysis of symmetric key cryptographic algorithms | |
CN111432403A (en) | Data auditing method and device based on block chain | |
CN102231181B (en) | Computer system used for file encryption and file encryption method | |
Chaeikar et al. | Secure SMS transmission based on social network messages | |
CN111683061A (en) | Block chain-based Internet of things equipment access control method and device | |
CN111931194A (en) | Security monitoring big data processing method and device based on cloud computing | |
CN111800784A (en) | Block chain cloud service system based on cloud computing | |
CN110830261A (en) | Encryption method, device, computer equipment and storage medium | |
Ragab et al. | Hybrid cryptosystems for protecting IoT smart devices with comparative analysis and evaluation | |
Nosrati et al. | Security assessment of mobile-banking | |
CN111666470A (en) | Big data business condition management system based on intelligent terminal | |
CN111641494A (en) | Method and device for realizing global block chain | |
CN111654859A (en) | Mobile block chain resource allocation method and device | |
Du et al. | The applications of blockchain in the covert communication | |
CN111800384A (en) | Financial service application management method and device based on block chain | |
CN111654854A (en) | Remote data optimized transmission method and system based on cloud computing system | |
Orucho et al. | Review of Algorithms for Securing Data Transmission in Mobile Banking | |
Thitme et al. | A recent study of various encryption and decryption techniques | |
Joseph et al. | Design a hybrid optimization and homomorphic encryption for securing data in a cloud environment | |
CN111698219A (en) | Block chain ledger implementation method and device based on material spectral characteristics | |
Libed et al. | Enhancing MD5 Collision Susceptibility |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20200915 |
|
WW01 | Invention patent application withdrawn after publication |